Movatterモバイル変換


[0]ホーム

URL:


US8667579B2 - Methods, systems, and computer readable media for bridging user authentication, authorization, and access between web-based and telecom domains - Google Patents

Methods, systems, and computer readable media for bridging user authentication, authorization, and access between web-based and telecom domains
Download PDF

Info

Publication number
US8667579B2
US8667579B2US13/306,632US201113306632AUS8667579B2US 8667579 B2US8667579 B2US 8667579B2US 201113306632 AUS201113306632 AUS 201113306632AUS 8667579 B2US8667579 B2US 8667579B2
Authority
US
United States
Prior art keywords
application
access
client device
user
access token
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US13/306,632
Other versions
US20130139241A1 (en
Inventor
Michael Leeder
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ribbon Communications Operating Co Inc
Original Assignee
Genband US LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Genband US LLCfiledCriticalGenband US LLC
Priority to US13/306,632priorityCriticalpatent/US8667579B2/en
Assigned to GENBAND US LLCreassignmentGENBAND US LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: LEEDER, MICHAEL
Publication of US20130139241A1publicationCriticalpatent/US20130139241A1/en
Application grantedgrantedCritical
Publication of US8667579B2publicationCriticalpatent/US8667579B2/en
Assigned to SILICON VALLEY BANK, AS ADMINISTRATIVE AGENTreassignmentSILICON VALLEY BANK, AS ADMINISTRATIVE AGENTPATENT SECURITY AGREEMENTAssignors: GENBAND US LLC
Assigned to SILICON VALLEY BANK, AS ADMINISTRATIVE AGENTreassignmentSILICON VALLEY BANK, AS ADMINISTRATIVE AGENTCORRECTIVE ASSIGNMENT TO CORRECT PATENT NO. 6381239 PREVIOUSLY RECORDED AT REEL: 039269 FRAME: 0234. ASSIGNOR(S) HEREBY CONFIRMS THE PATENT SECURITY AGREEMENT.Assignors: GENBAND US LLC
Assigned to GENBAND US LLCreassignmentGENBAND US LLCTERMINATION AND RELEASE OF PATENT SECURITY AGREEMENTAssignors: SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT
Assigned to SILICON VALLEY BANK, AS ADMINISTRATIVE AGENTreassignmentSILICON VALLEY BANK, AS ADMINISTRATIVE AGENTSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: GENBAND US LLC, SONUS NETWORKS, INC.
Assigned to CITIZENS BANK, N.A., AS ADMINISTRATIVE AGENTreassignmentCITIZENS BANK, N.A., AS ADMINISTRATIVE AGENTSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: RIBBON COMMUNICATIONS OPERATING COMPANY, INC.
Assigned to RIBBON COMMUNICATIONS OPERATING COMPANY, INC.reassignmentRIBBON COMMUNICATIONS OPERATING COMPANY, INC.MERGER (SEE DOCUMENT FOR DETAILS).Assignors: GENBAND US LLC
Assigned to RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (F/K/A GENBAND US LLC AND SONUS NETWORKS, INC.)reassignmentRIBBON COMMUNICATIONS OPERATING COMPANY, INC. (F/K/A GENBAND US LLC AND SONUS NETWORKS, INC.)TERMINATION AND RELEASE OF PATENT SECURITY AGREEMENT AT R/F 044978/0801Assignors: SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT
Assigned to RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (F/K/A GENBAND US LLC AND SONUS NETWORKS, INC.)reassignmentRIBBON COMMUNICATIONS OPERATING COMPANY, INC. (F/K/A GENBAND US LLC AND SONUS NETWORKS, INC.)RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: CITIZENS BANK, N.A.
Assigned to HPS INVESTMENT PARTNERS, LLC, AS ADMINISTRATIVE AGENTreassignmentHPS INVESTMENT PARTNERS, LLC, AS ADMINISTRATIVE AGENTSHORT-FORM PATENTS SECURITY AGREEMENTAssignors: RIBBON COMMUNICATIONS OPERATING COMPANY, INC.
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Methods, systems, and computer readable media for bridging user authentication, authorization, and access between web-based and telecom domains are disclosed. In one example, a method includes issuing, to an application hosted in a web-based network, an access token associated with a user identifier subscribed to a telecommunications network, wherein the access token is issued in response to receiving telecommunications network credentials from a client device associated with the user identifier and receiving, at an over the top (OTT) proxy element in the telecommunications network from the application, the access token for requesting user data associated with the client device to be used to access the application. The method further includes retrieving the user data if the access token is valid a telecommunications network context condition is met and providing the user data to the application, wherein access to the application by the client device is based on the user data.

Description

TECHNICAL FIELD
The subject matter described herein relates to authentication and authorization pertaining to applications. More specifically, the subject matter relates to methods, systems, and computer readable media for bridging user authentication, authorization, and access across web-based and telecom domains.
BACKGROUND
Modern telecommunications networks offer users a vast array of options for connecting and interacting with one another. In addition to choices provided by telecommunications providers themselves, users can now utilize a variety of independently developed products and services that run “on top” of the infrastructure maintained by the telecommunications industry. These independently developed products and services are commonly referred to as over-the-top (OTT) services because these services are not developed with a specific telecommunications provider's network in mind, but rather are designed to interconnect users via a provider-independent platform.
With the proliferation of smartphone, social networks, OTT applications and self-serve application stores, users are increasingly creating their own customized bundles of applications, made up of applications from the telecom, enterprise and Internet domains. Within this disjointed application model, user identification, authentication and authorization has become a difficult management problem, forcing users to manage a large number of individual usernames and passwords, and having to log in multiple times each day, as they invoke different applications. Furthermore, they have to enter their personal information and manage this across all of the application domains that they access.
To address these issues, many of the large OTT sites and social networks have implemented delegated authorization mechanisms, which allow a user to login once to an OTT property, and then to use this login as a single-sign-on mechanism to other applications, and for authorizing other applications to access their personal data. This provides improved user experience for end users, and encourages them to remain anchored and active within the OTT community. These evolving mechanisms present a real problem for the telecom operators, since it encourages users to anchor their application experience in the OTT domains and social networks, which creates a barrier for operators when introducing new telecom hosted applications.
Accordingly, a need exists for methods, systems, and computer readable media for bridging user authentication, authorization, and access across internet and telecom domains.
SUMMARY
The subject matter described herein includes methods, systems, and computer readable media for bridging user authentication, authorization, and access across internet and telecom domains. According to one embodiment, a method includes issuing, to an application hosted in a web-based network, an access token associated with a user identifier subscribed to a telecommunications network, wherein the access token is issued in response to receiving telecommunications network credentials from a client device associated with the user identifier and receiving, at an over the top (OTT) proxy element in the telecommunications network from the application, the access token for requesting user data associated with the client device to be used to access the application. The method further includes retrieving the user data if the access token is valid a telecommunications network context condition is met and providing the user data to the application, wherein access to the application by the client device is based on the user data.
According to another embodiment of the present subject matter, a system includes an application server residing in a web-based network that is configured to host an application and to provide an access token associated with a user identifier subscribed to a telecommunications network, wherein the access token is initially received by the application in response to a client device associated with the user identifier providing telecommunications network login credentials to an OTT proxy element. The system further includes an OTT proxy element that resides in a telecommunications network and is configured to receive the access token from the application server, to retrieve the user data if the access token is valid and a telecommunications network context condition is met, and to provide the user data to the application, wherein access to the application by the client device is based on the user data.
The subject matter described herein can be implemented in software in combination with hardware and/or firmware. For example, the subject matter described herein may be implemented in software executed by one or more processors. In one exemplary implementation, the subject matter described herein may be implemented using a non-transitory computer readable medium having stored thereon computer executable instructions that when executed by the processor of a computer control the computer to perform steps. Exemplary computer readable media suitable for implementing the subject matter described herein include non-transitory computer readable media, such as disk memory devices, chip memory devices, programmable logic devices, and application specific integrated circuits. In addition, a computer readable medium that implements the subject matter described herein may be located on a single device or computing platform or may be distributed across multiple devices or computing platforms.
As used herein, the term “node” refers to a physical computing platform including one or more processors and memory.
As used herein, the terms “function” or “module” refer to software in combination with hardware (such as a processor) and/or firmware for implementing features described herein.
BRIEF DESCRIPTION OF THE DRAWINGS
The subject matter described herein will now be explained with reference to the accompanying drawings of which:
FIG. 1 is a block diagram illustrating an exemplary network for bridging user authentication, authorization, and access across Internet and telecom domains according to an embodiment of the subject matter described herein;
FIG. 2 is a flow chart illustrating an exemplary process for bridging user authentication, authorization, and access across internet and telecom domains according to an embodiment of the subject matter described herein;
FIG. 3 is a message flow diagram illustrating a request for an access token to an OTT proxy element according to an embodiment of the subject matter described herein; and
FIG. 4 is a message flow diagram illustrating a single sign on (SSO) procedure where a user is SIP registered according to an embodiment of the subject matter described herein;
FIG. 5 is a message flow diagram illustrating a single sign on (SSO) procedure where a user is not SIP registered according to an embodiment of the subject matter described herein; and
FIG. 6 is a block diagram illustrating an exemplary token architecture according to an embodiment of the subject matter described herein.
DETAILED DESCRIPTION
Methods, systems, and computer readable media for bridging user authentication, authorization, and access between web-based and telecom domains are provided. According to one aspect, the present subject matter described herein may include a system that enables telecommunications identities (e.g., IMS/SIP) and credentials to be used in an implicit manner to authenticate web users in a single sign on (SSO) operation. The system may also allow user profile, context, ad targeting data, and the like to be authorized and shared with a web based application according to authorization policies. In one embodiment, the present subject matter utilizes a mechanism to integrate token based authorization, such as oAuth 2.0, into the IMS identity architecture. Similarly, the present subject matter may employ a mechanism to extend implicit user authorization to other applications and utilize a dynamic token status to allow authorization status to reflect user context, policy rules, and registration state. Although the following disclosure described the use of oAuth 2.0 tokens, any other token based authentication scheme may be used without departing from the present subject matter.
FIG. 1 depicts anexemplary system100 that comprises an over-the-top (OTT) proxy element102 (e.g., an OTT proxy gateway, an OTT proxy server, etc.) that resides at the edge of a telecommunications (i.e., telecom)network110, such as an IP multimedia subsystem (IMS) and/or session initiation protocol (SIP) network. In one embodiment,telecommunications network110 may include atoken manager116, auser profile server114, and aregistrar server112.OTT proxy element102 may also be communicatively connected to an ecosystem application server (EAS)106 residing in a web-based Internet network. EAS106 may also be connected to a token storage server ordatabase108.System100 may further include at least oneclient device104 which may be used by a telecom subscriber to access applications residing in the web-based internet network. Although only one EAS120 is shown inFIG. 1, additional application servers may be communicatively coupled toOTA proxy element102 without departing from the scope of the present subject matter.
In one embodiment,client device104 may include any mobile client device, such as a smartphone, a cellular phone, and a personal digital assistant device, that can access a SIP based telecommunications network. In another embodiment,client device104 may include a fixed client device, such as a personal computer (PC) or an Internet protocol television (IPTV), that utilizes fixed access (e.g., DSL) to access an application. For example,client device104 may also include any device that can register with an IMS/SIP network. In one embodiment,client device104 may be configured to use an active registration state (e.g., an active SIP registration state) to identify, authenticate and authorize itself within web and internet based applications. For example,client device104 may be configured to utilize an access token to implicitly log into an ecosystem partner application using associated SIP/IMS login information and state. In one embodiment,client device104 may be provisioned with a non-telecom client application, such as a local web browser. Although the active registration state is described herein as an active SIP registration state, registration states established in other protocols (e.g., a subscriber identification module (SIM) protocol, a radius protocol, a Diameter protocol, a packet data protocol (PDP) context protocol, an extensible messaging and presence protocol (XMPP), etc.) may be utilized without departing from the scope of the present subject matter. In one embodiment, the present subject matter may apply to other forms of registered services, such as an extensible mapping and presence protocol (XMPP) or proprietary systems, such as Skype and the like.
In one embodiment, EAS106 may include any type of network node, server, or element that resides in the IP network. EAS106 may be configured to host one or more applications, such asapplication120. For example,application120 may include a web-based application that may require a username and password to establish a log-in session. Although the following disclosure describesapplication120 as a web application or web-based application, other applications (e.g., enterprise based applications or mobile device applications) may be utilized without departing from the scope of the present subject matter. EAS106 may also have access to atoken storage entity108. In one embodiment,token storage entity108 may include any network element, server, or database residing in the web-based portion ofsystem100 that is configured to provide user authorization policies and token resolution. For example,token storage entity108 may maintain and manage saved access tokens issued byOTT proxy element102. Notably, access tokens stored intoken storage entity108 may be issued by and used to gain access toOTT proxy element102.
In one embodiment,OTT proxy element102 may include any network element residing intelecommunications network110 that is configured to provide a secure bridge between an IMS/SIP network and a web based network. For example,OTT proxy element102 may utilize amanagement module122 to perform a number of functions that coordinate the interactions between a telecommunications network and one or more Internet protocol networks. For example, management module may provide security functions for traffic entering intotelecommunications network110 from the IP network.Management module122 inOTT proxy element102 may also be configured to receive web-based application access requests from ecosystem application servers. Notably,management module122 may manage a plurality of web-based application programming interfaces (APIs) (e.g., HTTP related) that handle incoming requests from web-based applications in the IP network(s).Management module122 may also coordinate the APIs provisioned onOTT proxy element102 to map incoming IP-based requests into an appropriate telecommunications protocol and facilitate the interaction with the correct network component in thetelecommunications network110. For example,management module122 may interact with the voice network by mapping between VoIP voice call protocols and telecom voice call protocols.Management module122 inOTT proxy element102 may also manage external APIs that provide a particular quality of service (QoS) to web-based application traffic. In one embodiment,OTT proxy102 presents and manages REST APIs to external applications (e.g., application120).
In one embodiment,OTT proxy element102 may be configured to facilitate the assignment of access tokens. For example, a telecom subscriber associated withclient device104 may attempt to first access a web-basedapplication120 hosted in an IP network. In instances whereclient device104 cannot be authenticated (e.g., is not logged into or registered) byapplication120,application120 may be configured to redirect theclient device104 to a telecom provider'sOTT proxy element102.Client device104 may then be used to provide its telecommunications based credentials (i.e., not IP based credentials) toOTT proxy element102. In one embodiment,client device104 provides a SIP user address and a related password toOTT proxy element102. In response,OTT proxy element102 may forward these user credentials to aregistrar server112 to determine if client device has an active SIP registration state and to auser profile server114 to determine the access policies associated withclient device104. In one embodiment,user profile server114 may include any network element residing intelecommunications network110 that is configured to provide identity authorization service. For example,user profile server114 may maintain and manage identity mappings (e.g., SIP to OTT property), persona identification, and the addition of passwords to IMS profiles. In one embodiment,registrar server112 may include any network element residing intelecommunications network110 that is configured to provide user context service. For example,registrar server112 may maintain and manage persona identification and real-time registration state (e.g., IMS registration and/or SIP registration) ofclient device104.
Once authenticated byregistrar server112, atoken manager116 may generate an access token that includes access policies associated with the authenticated client device and at least one application. In one embodiment,token manager116 may include any network element residing intelecommunications network110 that is configured to provide user authorization policies and token resolution. For example,token manager116 may maintain and manage the assignment of privileges (i.e., authorization policies) to tokens based on the application, user, persona, and the like.Token manager116 may also be used to generate tokens and map tokens to user authorization policies. An exemplary access token may include security information for a log-in session, such as a user's identification, a user's groups, and a user's privileges (e.g., access token policies). In one embodiment, the user's identification may include a SIP public identifier, which may comprise of one or more user attributes such as, an explicit login password, user preferences, usage analytics (e.g., advertisement targeting data), personalization data, charging data (e.g., credit card number), previous visit history, friend/buddy data, and an access grant list (e.g., application identifier, expiry, permissions and policies, etc.).
In one embodiment, the generated token may include access policies that are associated with the authentication session related to the web-basedapplication120 that theclient device104 is attempting to access. Thus, a telecom provider may utilizeOTT proxy element102 to control the application's access to the telecom network as well as access to profile data and context data associated withclient device104. In one embodiment, the user's context data includes state information related to the user, such as presence information, location information, registration information, and roaming state. Similarly, a user's profile data may include profile authorization rules that are based on day of the week, time of day, active persona, user device type, current access network, and the like.
After the access token is generated,OTT proxy element102 redirectsclient device104 back toapplication120.OTT proxy element102 also provides the application with the access token. In one embodiment, access token exchanges are communicated via a secure transport layer, such as HTTPS (SSL), in order to protect token integrity. Similarly, oAuth 2.0 token exchange may be used to protect the user credentials in the telecommunications network.
Upon receiving the access token,application120 authenticatesclient device104 and providesclient device104 access to the application web site. Notably, the user ofclient device104 does not need to obtain a user identifier or establish a password with the IP basedapplication120. Theapplication120 may also store the access token in token storage entity108 (e.g., a dedicated server or database) for later use.
In theevent client device104 makes a subsequent request to access the IP basedapplication120,application120 identifies theclient device104 and accessestoken storage108 in order to retrieve the related access token. In one embodiment, the application may identifyclient device104 by detecting a cookie user identifier inclient device104.Application120 may also utilize the cookie user identifier to retrieve the correct access token intoken storage108. The application may then pass the retrieved access token toOTT proxy element102, which then retrieves user related data associated withclient device104, such as the user's SIP public user identifier and token access policies. Prior to providing the user related data toapplication120,OTT proxy element102 may also determine whetherclient device104 is SIP registered and whether the token is valid by communicating withregistrar server112. Ifclient device104 is SIP registered and the token is still valid,OTT proxy element102 notifies the application that the user ofclient device104 has been authenticated and provides the user profile and context data toapplication120. The profile and context data thatapplication120 is authorized to received is determined by the token policies contained within the access token. After receiving the user profile and context data,application120 establishes a log-in session forclient device104 and utilizes the user profile and context data to customize the user's experience. Although the above example describes an embodiment based on IMS/SIP registration mechanisms, other stateful registration mechanisms such as packet data protocol (PDP) context establishment, PDP activation, AAA via radius/Diameter registration (e.g., via DSL), a subscriber identification module (SIM) protocol mechanism, an extensible messaging and presence protocol (XMPP) mechanism, a voice over IP application protocol mechanism (e.g., Skype), and presence server state, may be used without departing from the scope of the present subject matter.
FIG. 2 depicts a flow chart that depicts amethod200 for media for bridging user authentication, authorization, and access between web-based and telecom domains. For example,method200 discloses a single sign on and user authentication process that may be conducted in accordance with the present subject matter. Inblock202, aclient device104 accesses aweb application120 hosted by anEAS106. For example,client device104 may access theweb application120 via an HTTP GET message. In one embodiment,EAS106 resides in a web-based domain andclient device104 is associated with a user subscribed to a SIP-basedtelecommunications network110.
Inblock204, a determination as to whether an access token is available (if the client device is not logged into the application). For example,application120 determines if an access token associated with the requestingclient device104 is available in token storage. If the access token is not available,method200 proceeds to block206 whereapplication120 redirects theclient device104 toOTT proxy element102. In one embodiment,application120 uses a anHTTP302 message to redirectclient device104 toOTT proxy element102 and provide a client identifier and a return URL address associated withapplication120. A client application inclient device104 may contactOTT proxy102 for authentication by providing the client identifier and an application identifier via an HTTP GET message.
Inblock208, a request for access to user profile/context data is received. In one embodiment,OTT proxy element104 presents a web page toclient device104 requesting permission to allowapplication120 to access login data associated withclient device104. As used herein, profile data includes static information that may be provisioned and stored. Notably, profile data may includes data that remains static for long periods of time, such as a user name, an address, friend lists, phone numbers, app preferences, display format, and the like. Similarly, context data may include dynamic information that changes frequently, either changed directly by the user or changed due to user behavior or network/environmental conditions. Examples of context data that may be changed by the user include availability status (e.g. Busy, Please do not disturb), current profile photo and persona (e.g., a work profile vs. a home profile). Examples of context information that may change as a result of user behavior or network/environmental conditions may be presence state (e.g., user currently using the phone), user location, and time sensitive conditions. Notably, the present subject matter provides a secure and controlled way for applications to access both statically provisioned and dynamically provisioned user related data that is available within the operator's network.
Inblock210, the client device is redirected back to the web application. In one embodiment, after providing permission,client device104 is redirected back toapplication120 via the return URL address.OTT proxy element102 also provides a unique authorization code toapplication120.
Inblock212, an access token is requested. In one embodiment,application120 uses the authorization code and application identifier to request an access token fromOTT proxy element102.
Inblock214, the application and authorization code are validated. In one embodiment,OTT proxy element102 validatesapplication120 and the provided authorization code. Upon completing the validation process theOTT proxy element102 provides an access token to the application.OTT proxy element102 also retrieves the user's SIP login session data and POSTs the login session data to theapplication120.
Returning to block204, if is determined that an access token is available toapplication120, thenmethod200 proceeds to block216, where user profile/context data is requested from the OTT proxy element. In one embodiment,application120 passes the access token toOTT proxy element102 in an attempt to retrieve profile and context data associated withclient device104.
Inblock218, the user profile/context data is obtained. In one embodiment,OTT proxy element102 retrieves a SIP public user identifier and token access polices that are associated withclient device104.OTT proxy element102 may be configured to retain SIP public user identifier and token access polices if the access token is validated and a telecommunications network context condition is met. An exemplary telecommunications network context condition includes the determination thatclient device104 having an active SIP registration. Other exemplary telecommunications network context conditions include an approved subscription state associated with the client device (e.g., permitting access if the user has not exceeded data usage limits) and the presence (e.g., geographical presence) of theclient device104 in the telecommunications network service area.
Inblock220, a determination is made as to whether the access token is expired. If the access token is expired and invalid,OTT proxy element102 notifiesapplication120 of the expired token via an HTTP401 unauthorized message andmethod200 loops back to block206 where the token granting sequence is initiated in order to obtain a new access token. If the access token is found to be valid, thenmethod200 continues to block224 where a determination is made as to whetherclient device104 has an active SIP registration. If theclient device104 is SIP registered, thenmethod200 continues to block226 where theOTT proxy element102 provides user profile/context data toapplication120. In one embodiment,OTT proxy element102 sends a 200 OK message toapplication120 to indicate thatclient device104 is authenticated.OTT proxy element102 also sends the SIP user profile and context data that the application is authorized to receive (per the policies indicated in the access token).Application120 may then log in client device104 (into application120) and uses the profile/context data to customize the user's experience withinapplication120. In one embodiment, customization of the user experience may involve an application to record past user actions and activities related to that application. For example, a given application may store usage logs, recall past purchases on a commerce website, store a history of other people the user has communicated with, displaying the last screen/page, recording an eBook library list, and the like.Application120 may also store user preferences (e.g., display preferences, preferred instant messaging tool, preferred notification mechanisms, etc.), user profile data (e.g., friend/contact lists, billing/credit card numbers, user display name, profile photos, electronic business cards, etc.), application specific data (e.g., current page in open eBooks, favorite shopping categories for commerce applications, etc.), and user context data (e.g., the user's current location). The present subject matter also allows different applications to have controlled access to different portions of a particular user's profile/context data, which the application may then use to customize that application for the user. For instance, a web site for a store (e.g. Wal-Mart) may use user location information context data and previous shopping behavior for the user to display relevant items which are on sale at local stores. A social network may use contact or call log data to suggest new friends within the social network. A communication app may use the preferred notification mechanism data when new calls/messages arrive.
Returning to block224, if it is determined thatclient device104 is not currently SIP registered, thenmethod200 proceeds to block228, where an error message is sent to the web application. In one embodiment,OTT proxy element102 returns a “User not Registered” error message toapplication120.
Inblock230, client device is redirected to a login service. In one embodiment,application120 redirectsclient device104 to a login service hosted byOTT proxy element102. The user may be prompted to interact with the login service by providing a SIP user identifier and a password (i.e., conducting a SIP registration). In one embodiment, by providing a SIP user identifier and password, a user may activate the access token.
Inblock232, the client device is redirected to the application. In one embodiment,OTT proxy element102 may redirectclient device104 toapplication120 after the user is authenticated and their registration status as stored inregistrar server112 is changed to “web registered”. Specifically, OTT proxy element may redirectclient device104 toapplication120.Application120 may then send an HTTP GET message with the access token to OTT proxy element to restart the single sign on process.
FIG. 3 illustrates an exemplary messaging flow diagram that depicts a request for an access token fromOTT proxy element102. In this example, a user associated withclient device104 is currently registered in the IMS/SIP network110 and attempts to use an IMS/SIP login to access an ecosystem application hosted byEAS106 in a web based domain. In one embodiment,client device104 may send an HTTP GET message while browsing an ecosystem partner web/cloud application hosted byEAS106. Upon receiving the HTTP GET message,EAS106 may determine that the user is not logged into the requested application. The application may then redirectclient device104 toOTT Proxy element102 for authentication. In one embodiment,EAS106 may send, toclient device104, anHTTP302 redirect message that includes both a client/application identifier and a return URL associated the hosted application. The client/application identifier and return URL are stored byOTT proxy element102 for future use and reference.Client device104 may then contact OTT proxy element102 (e.g., via redirection by the application) and provide the client/application identifier via an HTTP GET message. In response,OTT proxy element102queries client device104 for permission to allow the application onEAS106 to access the user's IMS/SIP login data. In one embodiment,OTT proxy element102 presents a web page that is displayed onclient device104 that asks the user via a 200 OK message to allow the accessed ecosystem application to access the client's IMS/SIP login data. Afterclient device104 provides permission,OTT proxy element102 sends a message toclient device104 that redirectsclient device104 to the application hosted atEAS106. For example,OTT proxy element102 may send a redirection message that contains the return URL associated with the hosted application and a unique authorization code.
Upon receiving the redirection message,client device104 uses the return URL to contactEAS106 and provides the authorization code to the hosted application. The hosted application then uses the authorization code along with an application identifier and application secret (or any other confidential piece of information, such as a long stream of apparently random characters) to request an access token fromOTT proxy server102. In one embodiment, a network operator (e.g., an authentication server) provides the application secret to one or more applications. The receiving application may then be configured to keep the application secret confidential (e.g., the application secret should not be made visible in any manner). In the event an application performs an authentication process, the application provides the application secret back to the authentication server. Thus, an additional layer of security to help ensure the application is recognized by the authentication server.
In response to the access token request,OTT proxy server102 may validate the application (e.g., comparing the application identifier with the previously provided client/application identifier) and the authorization code and return an access token to the application atEAS106.OTT proxy element102 may then retrieve the user's login session data and provides (e.g., POSTs) the user data to the application instance, using the client/application identifier to determine the application URL. In an alternate embodiment, a PULL operation may instead be initiated by the application. Afterclient device104 is granted access to the hosted application, the hosted application may store the access token for future use and access associated withclient device104.
FIG. 4 illustrates an exemplary messaging flow diagram that depicts a single sign on (SSO) operation involvingOTT proxy element102. Although the following example describes tokens being used for controlled access to user profile and context data, tokens may also be applied to access other resources, such as APIs and specific data without departing from the present subject matter. In this example, a user is currently registered with the IMS/SIP network110 and has also previously authorized and logged into an ecosystem application hosted byEAS106, which resulted in the application receiving an access token (e.g., an oAuth token) to the ecosystem application. In one embodiment,client device104 is used to access an ecosystem partner application hosted by EAS106 (e.g.,device104 issues an HTTP GET message to access partner application). In response,EAS106 identifies the user and/or client device104 (e.g., by accessing a user identifier cookie on client device104) and determines that the user is not currently logged into the requested application.EAS106 may then use the user identifier to accesstoken storage108 to retrieve a previously issued access token associated with the user fromtoken storage108.EAS106 may then attempt to retrieve user data (e.g., SIP/IMS profile/context data) fromOTT proxy element102 by passing the access token toOTT proxy element102. Upon receiving the access token,OTT proxy element102 may then accessuser profile server114 and requests user data (e.g., a SIP public user identifier, token access policies, etc.) associated with the access token.OTT proxy element102 may then receive information about the SIP user and determine whether or not the access token is still valid (i.e., has not expired). In one embodiment, the validity of an access token is based on context and policy decisions. OTT proxy element may then also determine whether or notclient device104 is still currently SIP registered.
If the access token is valid and the SIP registration is active,OTT proxy element102 may return a 200 OK message to indicate thatclient device104 has been authenticated. In one embodiment,OTT proxy element102 may also include the profile and context data the application is authorized to receive (i.e., as indicated in the token policies). In response, an API associated with the partner application may use the access token to login the user and use the returned profile/context data in the access token to customize the user's experience.
FIG. 5 illustrates an exemplary messaging flow diagram that depicts a single sign on (SSO) operation involvingOTT proxy element102 in theevent client device104 is not SIP registered. In this example,client device104 has previously registered with IMS/SIP network110 and is also authorized and logged into an ecosystem application hosted byEAS106, which resulted in the application previously receiving an access token (e.g., an oAuth token). In one embodiment, the application accesses a browser cookie or unique identifier stored in a client application inclient device104. In one embodiment,client device104 is subsequently used to access an ecosystem partner application hosted by EAS106 (e.g., via issuing an HTTP GET message). In response, the application identifies client device104 (e.g., by recognizing a cookie user identifier) and determines thatclient device104 is not currently logged into the requested application.EAS120 may then retrieve an access token associated with the user fromtoken storage108.EAS120 may then attempt to retrieve user SPI/IMS profile/context data fromOTT proxy element102 by passing the access token toOTT proxy element102. Upon receiving the access token,OTT proxy element102 may then accessuser profile server114 and requests user data associated with the access token, such as a SIP public user identifier, token access policies, and the like.OTT proxy element102 may then determine whether thatclient device104 is not registered with IMS/SIP network110.
Upon determining thatclient device104 is not SIP registered,OTT proxy element102 may direct a “User not Registered” error message toapplication120. In response,application120 may send a redirect message toclient device104.Client device104 may then be redirected to a login service supported byOTT proxy element102. In one embodiment,client device104 is used to interact with the login service to SIP register by entering a SIP user identifier and password.Client device104 is then authenticated and the SIP registration status is changed to “web registered”.OTT proxy element102 may then send a redirect message toclient device104 which instructsclient device104 to contact the partner application, which may then reissue the HTTP GET message with the valid access token toOTT proxy element102.
FIG. 6 is a block diagram of an exemplary access token architecture. An access token is a mechanism which allows user profiles, context, ad targeting data and the like to be authorized and shared according to authorization policies, such as polices maintained at network PCRFs. Token600 may be depicted as comprising at least four portions that include an IMS/SIPpublic user identifier602, anapplication client identifier604, apolicy identifier606, and anexpiry timestamp608. In one embodiment, IMS/SIPpublic user identifier602 may be made up of an OTT proxy user profile that includes user credentials and a list of active tokens associated with the user. IMS/SIPpublic user identifier602 may also include an HSS profile and/or a user profile that each contains a service filtering policy and transparent data.Policy identifier606 may contain an authorization policy that includes token validity rules, API restrictions, and SLA limits.
In one embodiment,policy identifier606 may include a number of different customized usage policies attached to accesstoken600. For example,policy identifier606 may include fields that indicate the SIP registration status of the user, different roaming statuses (e.g., active vs. suspended) associated with different types of calling networks (e.g., home, roaming domestic, roaming international, etc.) utilized by the user, the API usage associated with the user (e.g., whether to allow or block instant messaging or presence notifications), and an API SLA associated with the user (e.g., whether a call should be allowed, throttled, or blocked depending on how may calls the user receives in an hour). For each of these fields,policy identifier606 may also include an associated specific policy field. For example, if the user is not SIP registered,policy identifier606 may prompt the user for login credentials. If the user is SIP registered, thenpolicy identifier606 may indicate an active status associated with the user. Similarly, if the client device associated with the user is in the home network or roaming domestically, then the policy associated with this particular token may indicated that roaming capabilities are activated. In contrast, if the client device is roaming internationally, the policy may indicate that roaming capabilities are suspended. Token600 may also include API usage and API SLA policies associated with the client device. For example, the policy may indicate that the client device may receive an unlimited number of UM notifications, but may block all presence notifications.
In short, token600 may include a usage policy that is customized for each particular client device. For example, customized SLA grades, customized authentication behaviors and customized authorization levels for different users and applications may be included in each particular token. In addition, modifications made totoken600 enables a network operator to dynamically change a user's authorization status to reflect user context, policy rules, and registration state.
It will be understood that various details of the subject matter described herein may be changed without departing from the scope of the subject matter described herein. Furthermore, the foregoing description is for the purpose of illustration only, and not for the purpose of limitation, as the subject matter described herein is defined by the claims as set forth hereinafter.

Claims (24)

What is claimed is:
1. A method for bridging authentication, authorization, and access between web-based and telecommunications networks, the method comprising:
issuing, to an application hosted in a web-based network, an access token associated with a user identifier subscribed to a telecommunications network, wherein the access token is issued in response to receiving telecommunications network credentials from a client device associated with the user identifier, and wherein the access token includes an oAuth-based token;
receiving, at an over the top (OTT) proxy element in the telecommunications network from the application, the access token for requesting user data associated with the client device to be used to access the application;
retrieving the user data if the access token is valid and a telecommunications network context condition is met; and
providing the user data to the application, wherein access to the application by the client device is based on the user data.
2. The method ofclaim 1 wherein the application includes at least one of: a web application, an enterprise based application, and a mobile device application.
3. The method ofclaim 1 wherein the client device includes at least one of: a mobile device and a fixed device.
4. The method ofclaim 1 wherein the telecommunications network context condition includes at least one of: the client device having an active registration in the telecommunications network, an approved subscription state associated with the client device, and the presence of the client device in the telecommunications network.
5. The method ofclaim 4 wherein the active registration includes an active registration in accordance with at least one of: a subscriber identification module (SIM) protocol, a radius protocol, a Diameter protocol, a packet data protocol (PDP) context protocol, an extensible messaging and presence protocol (XMPP), a voice over IP application protocol, and session initiation protocol (SIP).
6. A method for bridging authentication, authorization, and access between web-based and telecommunications networks, the method comprising:
issuing, to an application hosted in a web-based network, an access token associated with a user identifier subscribed to a telecommunications network, wherein the access token is issued in response to receiving telecommunications network credentials from a client device associated with the user identifier, wherein issuing an access token includes:
receiving, at the OTT proxy element, a request for authentication for access to the application from the client device, wherein the request includes an application identifier associated with the application;
providing an access token authorization code to the application in response to authenticating the client device;
receiving, at the OTT proxy element, an access token request containing the authorization code and the application identifier; and
providing the access token to the application in response to validating the application identifier and the authorization code;
receiving, at an over the top (OTT) proxy element in the telecommunications network from the application, the access token for requesting user data associated with the client device to be used to access the application;
retrieving the user data if the access token is valid and a telecommunications network context condition is met; and
providing the user data to the application, wherein access to the application by the client device is based on the user data.
7. The method ofclaim 1 wherein the user data includes at least one of: a session initiation protocol (SIP) public user identifier, token access policies, user profile data, user context data, and user status data associated with the client device.
8. The method ofclaim 1 wherein the client device includes a non-telecom client application.
9. The method ofclaim 1 wherein the user data includes token privileges that control access to application programming interfaces, network services, and static user data.
10. The method ofclaim 1 wherein the telecommunications network includes at least one of: a session initiation protocol (SIP) based network and an Internet protocol multimedia subsystem (IMS) based network.
11. The method ofclaim 1 wherein providing the access token includes providing the access token over a secure transport layer.
12. The method ofclaim 11 wherein the secure transport layer utilizes a hypertext transfer protocol secure (HTTPS) protocol.
13. A system for bridging authentication, authorization, and access between web-based and telecommunications networks, the system comprising:
an application server residing in a web-based network that is configured to host an application and to provide an access token associated with a user identifier subscribed to a telecommunications network, wherein the access token is initially received by the application in response to a client device associated with the user identifier providing telecommunications network login credentials to an OTT proxy element; and
an OTT proxy element that resides in a telecommunications network and is configured to receive the access token from the application server, to retrieve the user data if the access token is valid and a telecommunications network context condition is met, and to provide the user data to the application, wherein access to the application by the client device is based on the user data, and wherein the OTT proxy element is further configured to receive a request for authentication for access to the application from the client device, wherein the request includes an application identifier associated with the application, to provide an access token authorization code to the application in response to authenticating the client device, to receive, at the OTT proxy element, an access token request containing the authorization code and the application identifier, and to provide the access token to the application in response to validating the application identifier and the authorization code.
14. The system ofclaim 13 wherein the application includes at least one of: a web-based application, an enterprise based application, and a mobile device application.
15. The system ofclaim 13 wherein the client device includes at least one of: a mobile device and a fixed device.
16. The system ofclaim 13 wherein the telecommunications network context condition includes at least one of: the client device having an active registration in the telecommunications network, an approved subscription state associated with the client device, and the presence of the client device in the telecommunications network.
17. The system ofclaim 16 wherein the active registration includes an active registration in accordance with at least one of: a subscriber identification module (SIM) protocol, a radius protocol, a Diameter protocol, a packet data protocol (PDP) context protocol, an extensible messaging and presence protocol (XMPP), a voice over IP application protocol, and session initiation protocol (SIP).
18. The system ofclaim 13 wherein the user data includes at least one of: a SIP public user identifier, token access policies, user profile data, user context data, and user status data associated with the client device.
19. A system for bridging authentication, authorization, and access between web-based and telecommunications networks, the system comprising:
an application server residing in a web-based network that is configured to host an application and to provide an access token associated with a user identifier subscribed to a telecommunications network, wherein the access token is initially received by the application in response to a client device associated with the user identifier providing telecommunications network login credentials to an OTT proxy element, and wherein the access token includes an oAuth token; and
an OTT proxy element that resides in a telecommunications network and is configured to receive the access token from the application server, to retrieve the user data if the access token is valid and a telecommunications network context condition is met, and to provide the user data to the application, wherein access to the application by the client device is based on the user data.
20. The system ofclaim 13 wherein the client device includes a non-telecom client application.
21. The system ofclaim 13 wherein the user data includes token privileges that control access to application programming interfaces, network services, and static user data.
22. The system ofclaim 13 wherein the telecom-based network includes at least one of: a session initiation protocol (SIP) based network and an Internet protocol multimedia subsystem (IMS) based network.
23. The system ofclaim 13 wherein the OTT proxy element is further configured to provide the access token over a secure transport layer.
24. The system ofclaim 23 wherein the secure transport layer utilizes a hypertext transfer protocol secure (HTTPS) protocol.
US13/306,6322011-11-292011-11-29Methods, systems, and computer readable media for bridging user authentication, authorization, and access between web-based and telecom domainsActive2032-01-25US8667579B2 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US13/306,632US8667579B2 (en)2011-11-292011-11-29Methods, systems, and computer readable media for bridging user authentication, authorization, and access between web-based and telecom domains

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US13/306,632US8667579B2 (en)2011-11-292011-11-29Methods, systems, and computer readable media for bridging user authentication, authorization, and access between web-based and telecom domains

Publications (2)

Publication NumberPublication Date
US20130139241A1 US20130139241A1 (en)2013-05-30
US8667579B2true US8667579B2 (en)2014-03-04

Family

ID=48468066

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US13/306,632Active2032-01-25US8667579B2 (en)2011-11-292011-11-29Methods, systems, and computer readable media for bridging user authentication, authorization, and access between web-based and telecom domains

Country Status (1)

CountryLink
US (1)US8667579B2 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20110138453A1 (en)*2009-12-032011-06-09Samsung Electronics Co., Ltd.Single sign-on in mixed http and sip environments
US20130080544A1 (en)*2011-09-262013-03-28Sean M. LyonsSocial network stealth and counter messaging
US20140208410A1 (en)*2013-01-222014-07-24Canon U.S.A., Inc.Simplified user registration
US9178868B1 (en)*2013-06-242015-11-03Google Inc.Persistent login support in a hybrid application with multilogin and push notifications
US9298899B1 (en)2014-09-112016-03-29Bank Of America CorporationContinuous monitoring of access of computing resources
US20160094534A1 (en)*2014-09-292016-03-31Brother Kogyo Kabushiki KaishaService providing apparatus, storage medium and service providing method
WO2016094122A1 (en)*2014-12-122016-06-16Visa International Service AssociationProvisioning platform for machine-to-machine devices
US20170026404A1 (en)*2015-07-212017-01-26Genband Us LlcDenial of service protection for ip telephony systems
US9832252B2 (en)2014-03-272017-11-28Genband Us LlcSystems, methods, and computer program products for third party authentication in communication services
US20180026982A1 (en)*2015-04-022018-01-25Chengdu Td Tech Ltd.Unified authentication method for application in trunking system, server and terminal
US10404699B2 (en)2014-02-182019-09-03Oracle International CorporationFacilitating third parties to perform batch processing of requests requiring authorization from resource owners for repeat access to resources
US10838739B2 (en)2018-04-192020-11-17Circle Media Labs Inc.Network-connected computing devices and methods for executing operating programs in RAM memory
US11303627B2 (en)2018-05-312022-04-12Oracle International CorporationSingle Sign-On enabled OAuth token
US11877218B1 (en)2021-07-132024-01-16T-Mobile Usa, Inc.Multi-factor authentication using biometric and subscriber data systems and methods

Families Citing this family (77)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9043480B2 (en)2011-10-112015-05-26Citrix Systems, Inc.Policy-based application management
US9137262B2 (en)2011-10-112015-09-15Citrix Systems, Inc.Providing secure mobile device access to enterprise resources using application tunnels
US20140040979A1 (en)2011-10-112014-02-06Citrix Systems, Inc.Policy-Based Application Management
US20140032733A1 (en)2011-10-112014-01-30Citrix Systems, Inc.Policy-Based Application Management
US9215225B2 (en)2013-03-292015-12-15Citrix Systems, Inc.Mobile device locking with context
US9280377B2 (en)2013-03-292016-03-08Citrix Systems, Inc.Application with multiple operation modes
US8949938B2 (en)2011-10-272015-02-03Cisco Technology, Inc.Mechanisms to use network session identifiers for software-as-a-service authentication
US9406091B1 (en)*2012-03-122016-08-02Amazon Technologies, Inc.Persona based recommendations
US9154568B2 (en)*2012-03-202015-10-06Facebook, Inc.Proxy bypass login for applications on mobile devices
US9672574B2 (en)2012-03-202017-06-06Facebook, Inc.Bypass login for applications on mobile devices
US9237156B2 (en)*2012-05-212016-01-12Salesforce.Com, Inc.Systems and methods for administrating access in an on-demand computing environment
KR101453154B1 (en)*2012-05-302014-10-23모다정보통신 주식회사Method for Authorizing Access to Resource in M2M Communications
KR101453155B1 (en)*2012-05-302014-10-23모다정보통신 주식회사Method for Authorizing Access to Resource in M2M Communications
JP5962261B2 (en)*2012-07-022016-08-03富士ゼロックス株式会社 Relay device
CN102833593B (en)*2012-07-172015-12-16晨星软件研发(深圳)有限公司Authorization method, system and intelligent television that a kind of intelligent television is applied
US9152781B2 (en)2012-08-092015-10-06Cisco Technology, Inc.Secure mobile client with assertions for access to service provider applications
US9710664B2 (en)*2012-09-072017-07-18Amrita Vishwa VidyapeethamSecurity layer and methods for protecting tenant data in a cloud-mediated computing network
US10891599B2 (en)*2012-09-122021-01-12Microsoft Technology Licensing, LlcUse of state objects in near field communication (NFC) transactions
US9639318B2 (en)*2012-09-262017-05-02Tencent Technology (Shenzhen) Company LimitedSystems and methods for sharing image data
US9231939B1 (en)*2012-10-092016-01-05Google Inc.Integrating business tools in a social networking environment
US20140108558A1 (en)2012-10-122014-04-17Citrix Systems, Inc.Application Management Framework for Secure Data Sharing in an Orchestration Framework for Connected Devices
US9516022B2 (en)2012-10-142016-12-06Getgo, Inc.Automated meeting room
US20140109176A1 (en)2012-10-152014-04-17Citrix Systems, Inc.Configuring and providing profiles that manage execution of mobile applications
US20140109171A1 (en)2012-10-152014-04-17Citrix Systems, Inc.Providing Virtualized Private Network tunnels
US8910239B2 (en)2012-10-152014-12-09Citrix Systems, Inc.Providing virtualized private network tunnels
US9606774B2 (en)2012-10-162017-03-28Citrix Systems, Inc.Wrapping an application with field-programmable business logic
US20140108793A1 (en)2012-10-162014-04-17Citrix Systems, Inc.Controlling mobile device access to secure data
CN104854561B (en)2012-10-162018-05-11思杰系统有限公司 Application wrapper for application management framework
US9971585B2 (en)2012-10-162018-05-15Citrix Systems, Inc.Wrapping unmanaged applications on a mobile device
US9137131B1 (en)*2013-03-122015-09-15Skyhigh Networks, Inc.Network traffic monitoring system and method to redirect network traffic through a network intermediary
US9686284B2 (en)2013-03-072017-06-20T-Mobile Usa, Inc.Extending and re-using an IP multimedia subsystem (IMS)
US9992183B2 (en)*2013-03-152018-06-05T-Mobile Usa, Inc.Using an IP multimedia subsystem for HTTP session authentication
US10284627B2 (en)2013-03-292019-05-07Citrix Systems, Inc.Data management for an application with multiple operation modes
US9413736B2 (en)2013-03-292016-08-09Citrix Systems, Inc.Providing an enterprise application store
US9985850B2 (en)2013-03-292018-05-29Citrix Systems, Inc.Providing mobile device management functionalities
US8910264B2 (en)*2013-03-292014-12-09Citrix Systems, Inc.Providing mobile device management functionalities
US9355223B2 (en)2013-03-292016-05-31Citrix Systems, Inc.Providing a managed browser
US9455886B2 (en)2013-03-292016-09-27Citrix Systems, Inc.Providing mobile device management functionalities
US8813179B1 (en)2013-03-292014-08-19Citrix Systems, Inc.Providing mobile device management functionalities
CN104125063B (en)*2013-04-282016-10-12腾讯科技(深圳)有限公司Authorization and authentication method, equipment and system
GB201307811D0 (en)*2013-04-302013-06-12Metaswitch Networks LtdProcessing data
CN109831492B (en)*2013-08-142021-06-22华为技术有限公司 Method and device for accessing OTT applications and server push messages
US9106642B1 (en)*2013-09-112015-08-11Amazon Technologies, Inc.Synchronizing authentication sessions between applications
CN105830414B (en)*2013-10-012019-07-12阿里斯企业有限责任公司Use the network insertion of the safety of voucher
CN104580074B (en)2013-10-142018-08-24阿里巴巴集团控股有限公司The login method of client application and its corresponding server
CN104090886B (en)*2013-12-092015-09-09深圳市腾讯计算机系统有限公司The method that structure user draws a portrait in real time and device
US9294462B2 (en)2014-01-152016-03-22Cisco Technology, Inc.Redirect to inspection proxy using single-sign-on bootstrapping
US9633209B1 (en)*2014-02-212017-04-25Amazon Technologies, Inc.Chaining of use case-specific entity identifiers
US9888119B2 (en)*2014-03-052018-02-06Cisco Technology, Inc.Contacts service for call center
CN105100913B (en)*2014-05-222020-04-03中兴通讯股份有限公司Video access method and system, set top box, proxy server and media server
CN103997454B (en)*2014-05-302017-11-21华为技术有限公司The application method and equipment of a kind of log information
US10187483B2 (en)*2014-08-122019-01-22Facebook, Inc.Managing access to user information by applications operating in an online system environment
JP6593008B2 (en)*2014-10-072019-10-23株式会社リコー Information processing apparatus, communication method, program, and system
US9736126B2 (en)*2014-12-042017-08-15International Business Machines CorporationAuthenticating mobile applications using policy files
US10505850B2 (en)*2015-02-242019-12-10Qualcomm IncorporatedEfficient policy enforcement using network tokens for services—user-plane approach
CN107196892B (en)2016-03-152020-03-06阿里巴巴集团控股有限公司Website login method and device
US10602094B1 (en)*2016-06-212020-03-24Amazon Technologies, Inc.Entitlement access token
US10375053B2 (en)*2016-09-092019-08-06Microsoft Technology Licensing, LlcCross-platform single sign-on accessibility of a productivity application within a software as a service platform
CN108153772A (en)*2016-12-052018-06-12天脉聚源(北京)科技有限公司A kind of method and system for exempting from password login webpage
US10355864B2 (en)2017-08-292019-07-16Citrix Systems, Inc.Policy based authentication
US20190190986A1 (en)*2017-12-192019-06-20Avaya Inc.Long polling for clustered application load balancing
US10681039B2 (en)*2018-01-082020-06-09Salesforce.Com, Inc.User authentication across multiple environments
US10572121B2 (en)*2018-02-092020-02-25International Business Machines CorporationContextual user profile photo selection
US11070562B2 (en)*2018-04-252021-07-20Vmware, Inc.Fine-grained IoT access control via device proxies and SDN-based micro-segmentation
US11232446B2 (en)2018-10-262022-01-25Hewlett Packard Enterprise Development LpCarrier grade telecom blockchain
US11310225B2 (en)2018-10-262022-04-19Hewlett Packard Enterprise Development LpAccess to telecom blockchain-based services with digital passport
US11513815B1 (en)2019-05-242022-11-29Hiro Systems PbcDefining data storage within smart contracts
US10699269B1 (en)*2019-05-242020-06-30Blockstack PbcSystem and method for smart contract publishing
US11657391B1 (en)2019-05-242023-05-23Hiro Systems PbcSystem and method for invoking smart contracts
US10715996B1 (en)2019-06-062020-07-14T-Mobile Usa, Inc.Transparent provisioning of a third-party service for a user device on a telecommunications network
EP3982615B1 (en)*2020-10-122024-09-11Nokia Technologies OyAuthorization in communication networks
US20220353298A1 (en)*2021-05-012022-11-03AtScale, Inc.Embedded and distributable policy enforcement
CN113542150B (en)*2021-07-142023-06-02杭州海康威视数字技术股份有限公司Data transmission method and device and central end network bridge
US12363177B2 (en)*2022-09-192025-07-15At&T Intellectual Property I, L.P.Systems and methods to provide account, billing and QoS SLA for OTT communication applications
US12346706B2 (en)*2022-11-022025-07-01Dell Products, L.P.Firmware-based switching between user profiles in a heterogeneous computing platform
CN117997568A (en)*2022-11-032024-05-07天翼数字生活科技有限公司Mobile terminal single sign-on authentication method and system
US12438869B2 (en)*2023-12-062025-10-07Sap SeSystems and methods for authorized movement of information between computer systems

Citations (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20010053160A1 (en)2000-04-112001-12-20Velio Communications, Inc. San Jose, CaMultistage digital cross connect with synchronized configuration switching

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20010053160A1 (en)2000-04-112001-12-20Velio Communications, Inc. San Jose, CaMultistage digital cross connect with synchronized configuration switching

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
"The OAuth 1.0 Guide: Protocol Workflow," Hueniverse, LLC, pp. 1-9 (Jul. 15, 2011).
A Study on the XML-Based Single Sign-On System Supporting Mobile and Ubiquitous Service Environments. Jenog et al. 2004.*
Cisco: Communications Transformations: Implementations Considerations when Enhancing Enterprise Communications Solutions with SIP Trunks. Jun. 2007.*
I, Me and My Phone: Identity and Personalization using Mobile Devices. Ghosh et al. Nov. 8, 2007.*
Singh, "OAuth: Token-Based Authorization for the Social Networking Age," www.internet.com, pp. 1-3 (Mar. 4, 2010).
SIP APIs for Voice and Video Communications on the Web. Davids et al. Jun. 2011.*

Cited By (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20110138453A1 (en)*2009-12-032011-06-09Samsung Electronics Co., Ltd.Single sign-on in mixed http and sip environments
US20130080544A1 (en)*2011-09-262013-03-28Sean M. LyonsSocial network stealth and counter messaging
US9269079B2 (en)*2011-09-262016-02-23GenzetSocial network stealth and counter messaging
US20140208410A1 (en)*2013-01-222014-07-24Canon U.S.A., Inc.Simplified user registration
US9251331B2 (en)*2013-01-222016-02-02Canon Information And Imaging Solutions, Inc.Simplified user registration
US9178868B1 (en)*2013-06-242015-11-03Google Inc.Persistent login support in a hybrid application with multilogin and push notifications
US10404699B2 (en)2014-02-182019-09-03Oracle International CorporationFacilitating third parties to perform batch processing of requests requiring authorization from resource owners for repeat access to resources
US9832252B2 (en)2014-03-272017-11-28Genband Us LlcSystems, methods, and computer program products for third party authentication in communication services
US9298899B1 (en)2014-09-112016-03-29Bank Of America CorporationContinuous monitoring of access of computing resources
US9686264B2 (en)*2014-09-292017-06-20Brother Kogyo Kabushiki KaishaService providing apparatus, storage medium and service providing method
US20160094534A1 (en)*2014-09-292016-03-31Brother Kogyo Kabushiki KaishaService providing apparatus, storage medium and service providing method
US11580519B2 (en)2014-12-122023-02-14Visa International Service AssociationProvisioning platform for machine-to-machine devices
WO2016094122A1 (en)*2014-12-122016-06-16Visa International Service AssociationProvisioning platform for machine-to-machine devices
RU2707939C2 (en)*2014-12-122019-12-02Виза Интернэшнл Сервис АссосиэйшнSupport platform for inter-machine devices
US20180026982A1 (en)*2015-04-022018-01-25Chengdu Td Tech Ltd.Unified authentication method for application in trunking system, server and terminal
US10721230B2 (en)*2015-04-022020-07-21Chengdu Td Tech Ltd.Unified authentication method for application in trunking system, server and terminal
US10542037B2 (en)*2015-07-212020-01-21Genband Us LlcDenial of service protection for IP telephony systems
US20170026404A1 (en)*2015-07-212017-01-26Genband Us LlcDenial of service protection for ip telephony systems
US10838739B2 (en)2018-04-192020-11-17Circle Media Labs Inc.Network-connected computing devices and methods for executing operating programs in RAM memory
US11303627B2 (en)2018-05-312022-04-12Oracle International CorporationSingle Sign-On enabled OAuth token
US11736469B2 (en)2018-05-312023-08-22Oracle International CorporationSingle sign-on enabled OAuth token
US12137091B2 (en)2018-05-312024-11-05Oracle International CorporationSingle sign-on enabled with OAuth token
US11877218B1 (en)2021-07-132024-01-16T-Mobile Usa, Inc.Multi-factor authentication using biometric and subscriber data systems and methods
US12245119B2 (en)2021-07-132025-03-04T-Mobile Usa, Inc.Multi-factor authentication using biometric and subscriber data systems and methods

Also Published As

Publication numberPublication date
US20130139241A1 (en)2013-05-30

Similar Documents

PublicationPublication DateTitle
US8667579B2 (en)Methods, systems, and computer readable media for bridging user authentication, authorization, and access between web-based and telecom domains
US10693885B2 (en)Social networking behavior-based identity system
US10944743B2 (en)Rich communication services security authentication system
US10057251B2 (en)Provisioning account credentials via a trusted channel
LeibaOauth web authorization protocol
US11595816B2 (en)System and method to support identity theft protection as part of a distributed service oriented ecosystem
US9979720B2 (en)Passwordless strong authentication using trusted devices
KR101696612B1 (en)User authentication management
CN109196500B (en)Unified VPN and identity based authentication for cloud based services
CN106716918B (en)User authentication method and system
US20110225637A1 (en)Authentication and authorization of user and access to network resources using openid
CN107690792A (en)Single sign-on for unmanaged mobile devices
CN106716960A (en) User authentication method and system
US9210155B2 (en)System and method of extending a host website
WO2012107058A1 (en)Method and system for supporting user authentication to a service
BakerOAuth2
KR20190019317A (en)Server and method for authentication in on-demand SaaS aggregation service platform
Pandey et al.Online Identity Management techniques: identification and analysis of flaws and standard methods
Peles et al.SpoofedMe-Intruding Accounts using Social Login Providers A Social Login Impersonation Attack

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:GENBAND US LLC, TEXAS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LEEDER, MICHAEL;REEL/FRAME:027579/0227

Effective date:20120109

STCFInformation on status: patent grant

Free format text:PATENTED CASE

ASAssignment

Owner name:SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT, CALIFORNIA

Free format text:PATENT SECURITY AGREEMENT;ASSIGNOR:GENBAND US LLC;REEL/FRAME:039269/0234

Effective date:20160701

Owner name:SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT, CALI

Free format text:PATENT SECURITY AGREEMENT;ASSIGNOR:GENBAND US LLC;REEL/FRAME:039269/0234

Effective date:20160701

ASAssignment

Owner name:SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT, CALIFORNIA

Free format text:CORRECTIVE ASSIGNMENT TO CORRECT PATENT NO. 6381239 PREVIOUSLY RECORDED AT REEL: 039269 FRAME: 0234. ASSIGNOR(S) HEREBY CONFIRMS THE PATENT SECURITY AGREEMENT;ASSIGNOR:GENBAND US LLC;REEL/FRAME:041422/0080

Effective date:20160701

Owner name:SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT, CALI

Free format text:CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT NO. 6381239 PREVIOUSLY RECORDED AT REEL: 039269 FRAME: 0234. ASSIGNOR(S) HEREBY CONFIRMS THE PATENT SECURITY AGREEMENT;ASSIGNOR:GENBAND US LLC;REEL/FRAME:041422/0080

Effective date:20160701

Owner name:SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT, CALI

Free format text:CORRECTIVE ASSIGNMENT TO CORRECT PATENT NO. 6381239 PREVIOUSLY RECORDED AT REEL: 039269 FRAME: 0234. ASSIGNOR(S) HEREBY CONFIRMS THE PATENT SECURITY AGREEMENT;ASSIGNOR:GENBAND US LLC;REEL/FRAME:041422/0080

Effective date:20160701

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551)

Year of fee payment:4

ASAssignment

Owner name:GENBAND US LLC, TEXAS

Free format text:TERMINATION AND RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT;REEL/FRAME:044986/0303

Effective date:20171221

ASAssignment

Owner name:SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT, CALIFORNIA

Free format text:SECURITY INTEREST;ASSIGNORS:GENBAND US LLC;SONUS NETWORKS, INC.;REEL/FRAME:044978/0801

Effective date:20171229

Owner name:SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT, CALI

Free format text:SECURITY INTEREST;ASSIGNORS:GENBAND US LLC;SONUS NETWORKS, INC.;REEL/FRAME:044978/0801

Effective date:20171229

ASAssignment

Owner name:CITIZENS BANK, N.A., AS ADMINISTRATIVE AGENT, MASSACHUSETTS

Free format text:SECURITY INTEREST;ASSIGNOR:RIBBON COMMUNICATIONS OPERATING COMPANY, INC.;REEL/FRAME:052076/0905

Effective date:20200303

ASAssignment

Owner name:RIBBON COMMUNICATIONS OPERATING COMPANY, INC., MASSACHUSETTS

Free format text:MERGER;ASSIGNOR:GENBAND US LLC;REEL/FRAME:053223/0260

Effective date:20191220

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:8

ASAssignment

Owner name:RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (F/K/A GENBAND US LLC AND SONUS NETWORKS, INC.), MASSACHUSETTS

Free format text:TERMINATION AND RELEASE OF PATENT SECURITY AGREEMENT AT R/F 044978/0801;ASSIGNOR:SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT;REEL/FRAME:058949/0497

Effective date:20200303

ASAssignment

Owner name:RIBBON COMMUNICATIONS OPERATING COMPANY, INC. (F/K/A GENBAND US LLC AND SONUS NETWORKS, INC.), MASSACHUSETTS

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:CITIZENS BANK, N.A.;REEL/FRAME:067822/0433

Effective date:20240620

ASAssignment

Owner name:HPS INVESTMENT PARTNERS, LLC, AS ADMINISTRATIVE AGENT, NEW YORK

Free format text:SHORT-FORM PATENTS SECURITY AGREEMENT;ASSIGNOR:RIBBON COMMUNICATIONS OPERATING COMPANY, INC.;REEL/FRAME:068857/0290

Effective date:20240826

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:12


[8]ページ先頭

©2009-2025 Movatter.jp